CVE-2025-50166
- EPSS 0.12%
- Published 12.08.2025 17:10:04
- Last modified 14.08.2025 17:36:03
Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network.
- EPSS 0.07%
- Published 12.08.2025 17:10:03
- Last modified 14.08.2025 17:36:42
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2025-50165
- EPSS 2.34%
- Published 12.08.2025 17:10:03
- Last modified 14.08.2025 17:05:02
Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
- EPSS 0.07%
- Published 12.08.2025 17:10:02
- Last modified 14.08.2025 17:41:15
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2025-50163
- EPSS 0.07%
- Published 12.08.2025 17:10:02
- Last modified 14.08.2025 17:41:02
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
CVE-2025-50161
- EPSS 0.07%
- Published 12.08.2025 17:10:01
- Last modified 14.08.2025 17:13:31
Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
CVE-2025-50159
- EPSS 0.07%
- Published 12.08.2025 17:10:00
- Last modified 14.08.2025 17:13:09
Use after free in Remote Access Point-to-Point Protocol (PPP) EAP-TLS allows an authorized attacker to elevate privileges locally.
- EPSS 0.07%
- Published 12.08.2025 17:10:00
- Last modified 14.08.2025 17:13:20
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
- EPSS 0.05%
- Published 12.08.2025 17:09:59
- Last modified 14.08.2025 17:13:01
Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally.
CVE-2025-50154
- EPSS 1.72%
- Published 12.08.2025 17:09:58
- Last modified 26.09.2025 13:09:38
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.